信息泄露

  • 网络information leakage;Information disclosure;disclosure of information
信息泄露信息泄露
  1. 信息的泄露本质上是信息的非法流动,因此信息流分析技术一直被用来寻找系统中潜在的各种信息泄露问题。

    Because information disclosure is essentially illegal flow of information , the technique of information flow analysis has been used to find potential disclosure of information .

  2. 公平信息披露的经济后果&基于收益波动性、信息泄露及寒风效应的实证研究

    The Economic Consequences of the Fair Disclosure of Information

  3. 目前,包括thenextweb在内的网站为苹果用户提供工具以查询自己是否不幸成为此次信息泄露的受害者。

    Sites including the next web are offering tools for concerned Apple customers to check if they are among the victims of the leak .

  4. 一次恐怖主义阴谋,信息泄露,秘密记录—收集—而这只是周三CNN学生新闻要带给你的第一个故事。

    A terrorist plot , leaked information , secret record-gathering-and that 's just the first story on this Wednesday 's show .

  5. 丹尼尔斯所使用的安全软件是洛杉矶AwarenessTechnologies公司生产的InterGuard,它被一些金融服务和医疗企业以及其他企业用来跟踪员工的工作效率、防止信息泄露以及遵守信息安全方面的规定。

    The security program Mr. Daniels uses , InterGuard by Awareness Technologies in Los Angeles , is used by financial-services , health-care and other employers to track productivity , prevent leaks and comply with security regulations .

  6. 电子邮件是Internet中应用最为广泛的服务之一,但由于电子邮件本身的工作机制存在着一定的漏洞,导致了在邮件进行传输的过程中邮件信息泄露或欺骗的事件经常发生。

    E-mail is one of the most favorite services in Internet . But the running mechanism of E-mail itself exists some leaks , as a result , the leaking and cheating incidents of E-mail information often take place during the process of mail transmitting .

  7. 据NPR新闻的克雷格·温德姆报道,基思·亚历山大将军出席了参议院委员会的听证会,这是自国家安全局大规模监视行动的信息泄露以后,亚历山大将军首次发声。

    NPR 's Craig Windham reports general Keith Alexander 's testimony before a senate panel is his first since information was leaked about the NRC sweeping surveillance effort .

  8. 惠普(HP)就曾在2006年卷入一件丑闻。为了确认信息泄露的渠道,代表该公司进行调查的人员利用虚假的借口,取得了惠普董事与记者的私人电话记录。

    In 2006 , Hewlett-Packard was embroiled in a scandal after investigators working on its behalf used false pretences to get hold of private phone records of board members and journalists , attempting to establish where leaks of information were occurring .

  9. 依据可信计算机系统评估标准,将安全OS的功能需求依次映射到内存管理子系统,初步提出安全内存管理子系统的四个功能:进程隔离、防止内存信息泄露、内存访问控制,虚拟内存保护;

    The functional requirements of a secure OS are mapped into a secure MMS in accordance with Trusted Computer System Evaluation Criteria . Process isolation , prevention of memory information leak , memory access control and virtual memory protection as four function requirements of secure MMS are first presented .

  10. 从上周末开始,中国各地的许多用户在尝试登录iCloud账户时,可能正在把登录信息泄露给第三方。这被称作中间人攻击。

    Starting over the weekend , when many users across China tried to sign into their iCloud accounts , they may have been giving away login information to a third party , in what is called a man-in-the-middle attack .

  11. 信息泄露防御模型在企业内网安全中的应用

    The Application of Information Leakage Defendable Model in Enterprise Intranet Security

  12. 其原因是模糊结果,以防止将信息泄露给外部观察者。

    The reason is to obscure the results from outside observers .

  13. 把信息泄露出去;泄露秘密。

    Reveal information ; let the cat out of the bag .

  14. 这样,避免跨抽象级别的信息泄露就变得很重要。

    Thus , it is important to avoid leakage across abstraction levels .

  15. 信息泄露的完整范围目前还没有得到确认。

    The full extent information leak has yet been determined .

  16. 但是该方法存在信息泄露等问题。

    But this method has the shortcoming of information leaking .

  17. 这个孩子终于上当,把那个重要信息泄露了出去。

    The child was trapped into making the vital information rise to the surface .

  18. 外国企业担心,中国有关部门可能把这些信息泄露给自己的竞争对手中国的国有企业。

    Foreign businesses fear the authorities could pass information on to their state-owned competitors .

  19. 对于苹果来说,此次信息泄露发生的时点非常不利,因为该公司即将进行一系列关键的产品发布。

    The leak is ill-timed for Apple , before a series of key launches .

  20. 这是韩国上个月发生的第二大规模的信息泄露事件。

    It 's the second major leak in South Korea in the past month .

  21. 伊冯信息泄露的事

    with the fallout from the Yvonne leak .

  22. 信息泄露、道德风险对项目决策影响分析

    How to Make a Project Decision on the Conditions of Information Leakage and Moral Hazard

  23. 移动通信终端信息泄露隐患及对策分析数据链中隐藏终端问题的几种解决方法

    Security Hidden Troubles based on Information Leakage of Mobile Communication Terminals and its Related Countermeasures

  24. 改进了算法,可快速获得解决敏感信息泄露的最佳方案;

    The algorithm was improved to obtain the best solution to sensitive information leakage quickly .

  25. 奥巴马总统表示,他不会对国家安全信息泄露的刑事调查做出道歉。

    President Obama said he makes no apologies for a criminal investigation into national security leaks .

  26. 但是,任何密码算法因实现不当,都会带来侧信道信息泄露的威胁。

    However , it will bring threat to side channel information leakage because of inappropriate realization .

  27. 如果这类信息泄露的话,别人将更加容易地伪造出你的卡,窃取钱财。

    Giving them up makes it easier to " clone " your cards and steal your money .

  28. 管理员可以从内部安装软件以防止敏感信息泄露到组织之外。

    Administrators can install the software internally to protect sensitive information from leaving the confines of an organization .

  29. 信息泄露事件发生的越来越频繁,而且大部分泄密都直接或者间接的源于公司内部人员。

    Information leakages happen more frequently , and most of them come from the insiders directly or indirectly .

  30. 一位熟悉马来西亚调查情况的人士称,华盛顿似乎是信息泄露的源头,这破坏了两国间的信任。

    ' Washington seems to be a leaky boat , ' said one person familiar with the Malaysian investigation .